• Title/Summary/Keyword: Access Control Manager

Search Result 48, Processing Time 0.027 seconds

A Study on the Transaction Security of Electronic Payment (전자결제의 보안성에 관한 연구)

  • 홍선의
    • The Journal of Information Technology
    • /
    • v.1 no.1
    • /
    • pp.173-188
    • /
    • 1998
  • In this paper we discussed various types of electronic payment schemes that are emerging. Threats vary from malicious hackers attempting to crash a system, to threats to data or transaction integrity. An understanding of the various types of threats can assist a security manager in selecting appropriate cost-effective controls to protect valuable information resources. An overview of many of today's common threats presented in this paper will be useful to mangers studying their own threat environments with a view toward developing solutions specific to their organization. To ensure security on the Internet, several methods have been developed and deployed. They include authentication of users and servers, encryption, and data integrity. Transaction security is critical : without it, information transmitted over the Internet is susceptible to fraud and other misuse. So computer systems represents an Intermediary with the potential to access the flow of information between a user. Security is needed to ensure that intermediaries cannot eavesdrop on transactions, or copy/modify data. Online firms must take additional precautions to prevent security breaches. To protect consumer information, they must maintain physical security of their servers and control access to software passwords and private keys. Techniques such as secret and public-key encryption and digital signatures play a crucial role in developing consumer confidence in electronic commerce.

  • PDF

A Design of Role Based Access Control Manager in Distributed Virtual Environment (분산 가상 환경에서 역할 기반 접근 제어 관리자 설계)

  • Jung, Heon-Man;Tak, Jin-Hyun;Lee, Sei-Hoon;Wang, Chang-Jong
    • Annual Conference of KIPS
    • /
    • 2000.04a
    • /
    • pp.175-180
    • /
    • 2000
  • 분산 가상 환경은 고속 통신망과 컴퓨팅 환경의 고급화로 응용 분야를 넓혀 가고 있으며, 보다 현실감 있는 상호작용으로 인해 만남과 대화, 협력 작업, 상거래, 오락 등의 인간의 사회적 활동을 지원하는 새로운 수단으로 자리잡고 있다. 가상 도시와 같은 대규모의 가상 환경에는 공원이나 거리, 건물의 로비 등과 같은 개방적인 공간과 사무실과 같은 업무 공간, 그리고 쇼핑몰과 같은 상거래 공간들이 공존하게 되므로 접근 제어와 보안이 보다 중요한 문제로 대두된다. 따라서, 이 논문에서는 분산 가상 환경내의 모든 사물들을 객체로 인식하고, 객체에 대한 역할을 기반으로 하는 접근 제어 모델을 제안하고, 제안한 모델을 기반으로 접근 제어 관리자를 설계하였다. 설계된 접근 제어 관리자는 가상 환경내 공간의 객체 뿐만 아니라 공간 자체도 하나의 객체로 인식하여 접근 제어를 하였다. 또한, 대규모 공간에서의 중요한 특징인 관리의 용이성과 동적인 변경을 가능하게 하기 위해, 역할을 기반으로 참여자와 객체를 연결하고, 객체가 갖고 있는 행위까지를 제어할 수 있었다.

  • PDF

A Study on Anonymous Authorization based on Short Group Signatures (짧은 그룹 서명 기법 기반의 익명 인가에 대한 연구)

  • Shin, Soo-Yeon;Kwon, Tae-Kyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.11-26
    • /
    • 2011
  • The existing anonymous authentication schemes based on group signatures for protecting privacy do not provide anonymous authorization which is required in the practical environments. In this paper, we propose an anonymous authentication and authorization scheme that enables a service provider both to authenticate anonymously its users and to provide different service according to their authorization. In the proposed scheme, a user's real identity, anonymity and authorization are managed distinctly through the separation of group manager's capabilities and an authorization authority. It is also possible for the proposed scheme to apply various access control models.

Design and Implementation of a High-Performance Index Manager in a Main Memory DBMS (주기억장치 DBMS를 위한 고성능 인덱스 관리자의 설계 및 구현)

  • Kim, Sang-Wook;Lee, Kyung-Tae;Choi, Wan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.7B
    • /
    • pp.605-619
    • /
    • 2003
  • The main memory DBMS(MMDBMS) efficiently supports various database applications that require high performance since it employs main memory rather than disk as a primary storage. In this paper, we discuss the index manager of the Tachyon, a next-generation MMDBMS. Recently, the gap between the CPU processing and main memory access times is becoming much wider due to rapid advance of CPU technology. By devising data structures and algorithms that utilize the behavior of the cache in CPU, we are able to enhance the overall performance of MMDBMSs considerably. In this paper, we address the practical implementation issues and our solutions for them obtained in developing the cache-conscious index manager of the Tachyon. The main issues touched are (1) consideration of the cache behavior, (2) compact representation of the index entry and the index node, (3) support of variable-length keys, (4) support of multiple-attribute keys, (5) support of duplicated keys, (6) definition of the system catalog for indexes, (7) definition of external APIs, (8) concurrency control, and (9) backup and recovery. We also show the effectiveness of our approach through extensive experiments.

Concurrency Control for Global Transaction Management in Integrated Heterogeneous Database System (이질형 통합 데이타베이스 시스템의 전역 트랜잭션을 위한 병행수행 제어기법)

  • Lee, Gyu-Ung
    • The KIPS Transactions:PartD
    • /
    • v.8D no.5
    • /
    • pp.473-482
    • /
    • 2001
  • Integrated heterogeneous database systems provide the unified interface for users and applications today in order to access the underlying diverse data sources located in different sites. The multiple heterogeneous data sources have the different and specialized data structures and transaction processing capabilities. Because of local autonomy, the local system does not have the capability of cooperation to control the global transaction. Hence designing the global transaction manager with supporting the global serializability is difficult task. To resolve the well-known indirect conflict, we define the global transaction model by using the characteristics of global integrity constraints. And then we propose the site-locking operation and its protocol to manage the global transaction. The correctness and analysis of our site-locking protocol is proved and performance gain over the related other methods is also estimated in this paper.

  • PDF

The Unified Wireless Control System for the Vibration Control of Bridge (교량의 진동제어를 위한 통합 무선제어 시스템)

  • Heo, Gwang Hee;Kim, Chung Gil;Oh, Ju Won
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.16 no.2
    • /
    • pp.65-74
    • /
    • 2012
  • This paper aimed at the development of a unified wireless control system in order to control various forms of vibration of bridges. This unified wireless control system unified all different systems each of which functioned for difference purpose such as measurement, analysis, judgement, and control of data acquired from the movement of structure. It was designed to control structures with feedback which was returned according to each different situation after analyzing various signals measured about the structure. In this system, every information in each step from measurement to control was wirelessly transmitted to its central system so that a manager was able to effectively monitor the whole process. Just for the case when any system control need to intervene occurred, a graph user interface was designed for better access. In order to evaluate its basic performance, an experiment was carried out to see how signal input and output were done by comparing its results with those of a wired system. On the basis of the experiment, a vibration control experiment was performed on a model of cable-stayed bridge to see if the unified wireless control system worked well in realtime. This was carried out under four conditions, and the graph and quantitative result under each condition were compared each other. All experiments proved that the unified wireless control system functioned as well as the wired one in terms of its basic performance and vibration control.

Design of an In-vehicle Intelligent Information System for Remote Management (차량 원격 진단 및 관리를 위한 차량 지능 정보시스템의 설계)

  • Kim, Tae-Hwan;Lee, Seung-Il;Lee, Yong-Doo;Hong, Won-Kee
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1023-1026
    • /
    • 2005
  • In the ubiquitous computing environment, an intelligent vehicle is defined as a sensor node with a capability of intelligence and communication in a wire and wireless network space. To make it real, a lot of problems should be addressed in the aspect of vehicle mobility, in-vehicle communication, common service platform and the connection of heterogeneous networks to provide a driver with several intelligent information services beyond the time and space. In this paper, we present an intelligent information system for managing in-vehicle sensor network and a vehicle gateway for connecting the external networks. The in-vehicle sensor network connected with several sensor nodes is used to collect sensor data and control the vehicle based on CAN protocol. Each sensor node is equipped with a reusable modular node architecture, which contains a common CAN stack, a message manager and an event handler. The vehicle gateway makes vehicle control and diagnosis from a remote host possible by connecting the in-vehicle sensor network with an external network. Specifically, it gives an access to the external mobile communication network such as CDMA. Some experiments was made to find out how long it takes to communicate between a vehicle's intelligent information system and an external server in the various environment. The results show that the average response time amounts to 776ms at fixed place, 707ms at rural area and 910ms at urban area.

  • PDF

Performance Analysis of Smartphone based u-NMS (스바트폰 기반의 u-NMS 성능 분석)

  • Kim, Chae-Hwan;Sohn, Woo-Jin;Lee, Kyung-Geun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.6B
    • /
    • pp.608-617
    • /
    • 2011
  • ubiquitous network management system (u-NMS) is the network management system based on smartphone which are recently of wide use. The purpose of the u-NMS is to provide convenience for network administrator utilizing the mobility of smartphone and to manage the network efficiently. This paper proposes the smart NMS agent and the mobility management server (MMS). The smart NMS agent enables to use the monitoring web server and remote control application on the smartphone in wireless network. The MMS is developed to reduce the problems such as handover latency and packet loss, which can be taken place in wireless network. The network manager can monitor traffic in real time through the smart NMS agent and remotely control the network efficiently when sudden failures happen in the u-NMS. In this paper, performance evaluation is carried out with our test-bed system implemented. We focus on the measurement of the MMS performance. When the MMS is compared to previous mobility management protocol, our mobility management server reduces the average latency up to 65% in initial access, handover latency and processing delay to the network management center.

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

Design of Automatic Inspection System for Maintenance of Unmanned Monitoring Facility (무인감시설비 유지보수를 위한 자동점검시스템 설계)

  • Moon, Chaeyoung;Kim, Semin;Ryoo, Kwangki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.515-517
    • /
    • 2018
  • Access to public facilities such as substations, dams and railway facilities is strictly controlled, and unmanned surveillance equipment has been introduced and operated recently due to the development of IT technology and the government's cost reduction policy. However, if an unmanned surveillance system is broken, surveillance space, information leakage caused by intruders, and damage to facilities may occur. Also, it is necessary to check periodical visit by the manager in order to check the surveillance facilities, which causes additional management costs. In order to solve this problem, we designed a system to check the operation status of the unmanned monitoring facility in real time, attempt to recover automatically when a problem occurs, and notify the administrator of the problem. The designed system consists of an NVR that receives and judges information such as image, sound, and lighting condition, and a control device that detects and restores the state of the unmanned monitoring facility. The system proposed in this paper is expected to contribute to the improvement of the economic efficiency due to the minimization of surveillance space due to the failure of the unmanned monitoring facility and the reduction of the inspection cost.

  • PDF